08.07.2015 Views

enabling self auditing for mobile clients in cloud computing

enabling self auditing for mobile clients in cloud computing

enabling self auditing for mobile clients in cloud computing

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

International Journal of Advanced Computer Technology (IJACT)ISSN:2319-7900on Computational Aspects of Social Networks (CA-SoN), pp: 198 – 205. DOI:10.1109/CASoN.2012.6412402.[37]. Pradnyesh Rane, 2010. Secur<strong>in</strong>g SaaS Applications: ACloud Security Perspective <strong>for</strong> Application Providers,”In<strong>for</strong>mationSystems Security,http://www.<strong>in</strong>fosectoday.com/Articles/Secur<strong>in</strong>g_SaaS_Applications.htm. (Accessed on April 12, 2013).[38] Eric Ogren, 2009. Whitelists SaaS modify traditionalsecurity, tackle flaws,http://search<strong>cloud</strong>security.techtarget.com/news/2240181882/Gartner-<strong>for</strong>ecasts-ris<strong>in</strong>g-<strong>in</strong>terest-<strong>in</strong>-<strong>cloud</strong>-basedsecurity-services.(Accessed on April 25, 2013).[39] Robert M<strong>in</strong>near, 2011. Latency: The Achilles Heel ofCloud Comput<strong>in</strong>g. Cloud Expo: Article, Cloud Comput<strong>in</strong>gJournal. http://<strong>cloud</strong>comput<strong>in</strong>g.syscon.com/node/1745523.(Accessed on April 12, 2013).[40] Meiko Jensen, Jorg Schwenk, Nils Gruschka, Luigi LoIacon, 2009. On technical Security Issues <strong>in</strong> CloudComput<strong>in</strong>g. Proc. of IEEE International Conference onCloud Comput<strong>in</strong>g (CLOUD-II, 2009), India, pp. 109-116. DOI: 10.1109/CLOUD.2009.60.[41] R. L Grossman, 2009. The Case <strong>for</strong> Cloud Comput<strong>in</strong>g.IT Professional, 11(2): pp. 23-27.[42] Bernd Grobauer, Tobias Walloschek and ElmarStöcker, 2010. Understand<strong>in</strong>g Cloud-Comput<strong>in</strong>g Vulnerabilities.IEEE Security and Privacy, pp. 99. DOI:10.1109/MSP.2010.115.[43] D. Gollmann, 2008 . Secur<strong>in</strong>g Web Applications. In<strong>for</strong>mationSecurity Technical Report. 13(1). DOI:10.1016/j.istr.2008.02.002.[44] Mashups, SaaS and Cloud Comput<strong>in</strong>g: Evolutions andRevolutions <strong>in</strong> the Integration Landscape.http://www.redad.org/summerschool09/slides/Bentallah_CTDS09_Mashups%20and%20SaaS.pdf. (Accessedon April 12, 2013).[45] Krishna tej Koganti, Eswar Patnala, Sai Sagar Naras<strong>in</strong>gu.J.N. Chaitanya, 2013. Virtualization Technology<strong>in</strong> Cloud Comput<strong>in</strong>g Environment. International Journalof Emerg<strong>in</strong>g Technology and Advanced Eng<strong>in</strong>eer<strong>in</strong>g,3 (3): 771-773.[46] Security Considerations White Paper <strong>for</strong> Cisco SmartStorage. Cisco Systems. 2010.http://www.cisco.com/en/US/docs/storage/nass/csbcdp/smart_storage/white_paper/Security_Considerations_OL-23025.pdf. (Accessed on March 24, 2013).[47] V.Saravanan, Dr.A.Sumathi, 2012. Dynamic HandoffDecision Based on Current Traffic Level and NeighborIn<strong>for</strong>mation <strong>in</strong> Wireless Data Networks. InternationalConference on Advanced Comput<strong>in</strong>g. DOI:10.1109/ICoAC.2012.6416797.[48] V. Saravanan, A. Sumathi, 2012 . Handoff Mobileswith Low Latency <strong>in</strong> Heterogeneous Networks <strong>for</strong>Seamless Mobility: A Survey and Future Directions”,European Journal of Scientific Research. 81(3): 417-424.[49] V.Saravanan, Dr.A.Sumathi, S.Shanthana andM.Rizvana, 2013. Dual Mode Mpeg SteganographyScheme For Mobile and Fixed Devices. InternationalJournal of Eng<strong>in</strong>eer<strong>in</strong>g Research and Development, 6(3): 23-27. DOI: 0603.067X.0023.BiographiesPROF. V.SARAVANAN received hisB.Sc. degree <strong>in</strong> Computer Science fromPeriyar University, Salem, Tamilnadu,<strong>in</strong> 2003, the M.Sc. degree <strong>in</strong> ComputerScience from Thiruvalluvar University,Vellore, Tamilnadu, <strong>in</strong> 2005, the MCAdegree from Periyar University, Salem,Tamilnadu, the M.Phil degree <strong>in</strong> ComputerScience from Periyar University, Salem, Tamilnadu,and the M.E. degree <strong>in</strong> Computer Science and Eng<strong>in</strong>eer<strong>in</strong>gfrom the Anna University, Chennai, Tamilnadu, <strong>in</strong> 2008.Currently, he is pursu<strong>in</strong>g Ph.D. degree <strong>in</strong> Computer Scienceand Eng<strong>in</strong>eer<strong>in</strong>g from Anna University, Chennai, Tamilnadu.At present he is an Assistant Professor of IT Departmentat P.S.V. College of Eng<strong>in</strong>eer<strong>in</strong>g and Technology, Krishnagiri,Tamilnadu, affiliated to Anna University Chennai. Histeach<strong>in</strong>g and research areas <strong>in</strong>clude Mobile Comput<strong>in</strong>g, ImageProcess<strong>in</strong>g, Security and Cloud Comput<strong>in</strong>g. He hasmore than 10 International publications.PROF. S.THIRUKUMARAN is anAssistant Professor <strong>in</strong> Department ofComputer Applications at Adhiyamaancollege of Eng<strong>in</strong>eer<strong>in</strong>g, Hosur,He received his MCA degree <strong>in</strong> MadrasUniversity <strong>in</strong> 2000 and he is cont<strong>in</strong>u<strong>in</strong>ghis Ph.D. degree <strong>in</strong> Data M<strong>in</strong><strong>in</strong>g<strong>in</strong> Anna University, Chennai. So<strong>for</strong> he has published five papers <strong>in</strong> International Journalsunder m<strong>in</strong><strong>in</strong>g concept and his area of <strong>in</strong>terest is Data M<strong>in</strong><strong>in</strong>gContent Retrieval and Cloud Comput<strong>in</strong>g.ENABLING SELF AUDITING FOR MOBILE CLIENTS IN CLOUD COMPUTING59

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!